"Think Before U Click!" #ThinkB4UClick

Future events

  • 2017-09-01T00:00:00-02:00
  • 2040-01-31T23:00:00-01:00
September 1 Friday

Sep 01, 2017 12:00 AM to Jan 31, 2040 11:00 PM

Excellence can only be developed in a structured way through stable basic programs The Austria Security Hub is a plattform for an intensive and sustainable cooperation between a wide variety of companies and individuals in the cybersecurity environment and the education sector. At the same time, general IT security awareness is to be intensified at an early age and talents promoted through our platform.

  • 2018-04-23T00:00:00-02:00
  • 2025-12-30T23:00:00-01:00
April 23 Monday

Apr 23, 2018 12:00 AM to Dec 30, 2025 11:00 PM

The concienciat.gva.es portal is available to all citizens, SMEs and public administrations.

  • 2021-05-31T22:00:00+00:00
  • 2023-12-30T23:00:00+00:00
May 31 Monday

May 31, 2021 10:00 PM to Dec 30, 2023 11:00 PM

The Cyen-Cybersecruity YouTube channel is devoted to interesting discussions and presentations on cybersecurity management and policy, at the international, EU or company level.

  • 2021-09-30T22:00:00+00:00
  • 2023-09-29T22:00:00+00:00
September 30 Thursday

Sep 30, 2021 10:00 PM to Sep 29, 2023 10:00 PM

E' un programma con percorsi formativi completamente online. I percorsi prevedono l'accesso a diversi video corsi, video educativi, articoli informativi, guide "come fare per" coerenti con l'argomento seguito. Gli argomenti disponibili sono Sicurezza, Privacy e Anonimato online. Al termine del percorso è previsto il rilascio del diploma di certificazione delle abilità e delle conoscenze acquisite.

  • 2021-10-04T22:00:00+00:00
  • 2031-10-25T22:00:00+00:00
October 4 Monday

Oct 04, 2021 10:00 PM to Oct 25, 2031 10:00 PM

En CSIRT-CV perseguimos aumentar tanto el nivel de madurez en ciberseguridad, como la confianza en el uso de la tecnología de ciudadanos, empresas y el propio personal de GVA. En esta campaña titulada “Ciberseguridad, una asignatura pendiente”, hemos puesto el foco en los docentes para que puedan ayudar a sus alumnos en algunos temas relacionados con la ciberseguridad. Los menores son un colectivo nativo digital que piensan que son “expertos” y que tienden a infravalorar los peligros a los que están expuestos, siendo precisamente, esa falta de sensación de seguridad lo que les hace más vulnerables. Durante los años que llevamos impartiendo sesiones de ciberseguridad a alumnos de secundaria en colegios e institutos de toda la Comunidad Valenciana, nos hemos dado cuenta de la necesidad de introducir la ciberseguridad como un aspecto clave a tratar durante todo el curso académico. Por eso, nuestro objetivo con esta campaña es proporcionar a los profesores los conocimientos y recursos necesarios en ciberseguridad para afrontar las situaciones del día a día en las que se ven envueltos los alumnos. Esta campaña tiene un enfoque pedagógico y en ella se abordan temas básicos de ciberseguridad que afectan a los menores. Esperamos que sea de gran utilidad en las clases y que los alumnos aprendan a identificar y a hacer frente de forma adecuada a las amenazas online, convirtiéndose así en auténticos "human firewalls".

  • 2022-02-15T23:00:00+00:00
  • 2027-11-15T23:00:00+00:00
February 15 Tuesday

Feb 15, 2022 11:00 PM to Nov 15, 2027 11:00 PM

"Security Magazine" is a monthly magazine, issued from February 2022 in mobile form. As we have found out, this is the first magazine in this form that is devoted to broadly understood security in companies, and cybersecurity in particular. Approx. 80% of the readers of our other medium - the website olitykabezpieczenstwa.pl - open content using smartphones, the latest publicly available research confirms that today we read on phones and tablets. We wanted to meet the expectations and create a magazine that would educate, raise awareness, teach vigilance and broaden the horizons in the field of security. On the other hand, it should be convenient to read, at any time, and available to everyone. Our authors are experts from security companies, so they are people who have the knowledge, experience and willingness to share what may be valuable to readers. We reach management staff in companies of almost every industry, managers, managers, but also employees and everyone who is close to the subject of security and who are looking for free information on how to be safer. The statistics related to the magazine's interest have proved to us that what we are doing really makes sense and is necessary. The magazine was entered into the Court Register of Journals and Magazines.

  • 2022-02-28T23:00:00+00:00
  • 2023-09-30T22:00:00+00:00
February 28 Monday

Feb 28, 2022 11:00 PM to Sep 30, 2023 10:00 PM

Whether Communication, Health, or Mobility: IT Security plays an important role in all socially relevant areas. Due to the continuous linking of the digital and physical world, new challenges and questions are constantly developing. Innovative solutions and ideas are needed! Curiosity, openness, creativity, and the ability to change perspectives are therefore essential skills for a career in IT security. The career opportunities are as diverse as the challenges. With the Women in IT Security series, the Cluster of Excellence "CASA - Cyber Security in the Age of Large-Scale Adversaries" at the Ruhr University Bochum would like to make visible the variety of paths and opportunities in IT security - especially for women. Every month we introduce exciting women with different research interests who are working here at Ruhr University Bochum (RUB). Each is following her own unique career path and is working on one of the countless fascinating aspects of IT security. The range of topics is wide and each angle shows a different facet: sometimes a technical question is the focus of research, and sometimes human behavior in the context of IT security is illuminated.

  • 2022-03-31T22:00:00+00:00
  • 2023-03-30T22:00:00+00:00
March 31 Thursday

Mar 31, 2022 10:00 PM to Mar 30, 2023 10:00 PM

Nie pie (a) rz "is the slogan of social and educational leadership by Kang The action is to show how your internet scammers and warn against planned activities in the cryptocurrency industry. The fraud cases are fraud - fictitious cryptocurrency profiles, cryptocurrency profiles, pseudo-handing messages, text messages to a stock exchange account or the discovery of a private key. We plan to plan how you want to create online, we only organize online events like live with experts from crypto meeting, but also use public space. From May, billboards of the Nie pie (p) rz campaign appear in two large cities - Gdańsk and Warsaw. The educational activity of the campaign is in our social networks and blogs, where there is educational administration, e.g. how are you internet scammers. As a cryptocurrency exchange, we place great emphasis on the safety of our users and the emphasis on which users are pressed. In one of the articles for our blog, we introduce the audience to the topic how we, as Kanga, care for them. Willing to show how we've allied and something that corresponds to the ignorance of industry rules we represent to the trailer network showing how to protect ourselves from scams. What's next? The campaign is not slowing down. In the ensuing times, we had more interviews with children who would pass on to us their own practice on network services. We are also planning a training program for people with cryptocurrencies that would like it to be pleasant and free from unpleasant, and educational talks for high school students from Tri-City.

  • 2022-08-25T22:00:00+00:00
  • 2023-09-29T22:00:00+00:00
August 25 Thursday

Aug 25, 2022 10:00 PM to Sep 29, 2023 10:00 PM

Technical and organizational measures (TOM) are a key aspect of ensuring IT information protection. In particular, these are intended to ensure the confidentiality, integrity and availability of information and to protect against threats such as hacker attacks, unauthorized access or manipulation. GISA offers you the analysis and evaluation of the network plan as well as the general analysis of infrastructure usage and access options. Structured interviews and document analyses are used to analyze central network components, access points and central IT infrastructure systems, as well as to perform system audits and client checks. You will receive the results as well as suggestions for increasing the level of protection in a final report.

  • 2022-09-09T22:00:00+00:00
  • 2023-06-29T22:00:00+00:00
September 9 Friday

Sep 09, 2022 10:00 PM to Jun 29, 2023 10:00 PM

7th edition of the Czech National Cyber Security Competition - part of European Cyber Security Challenge (ECSC) supported by ENISA

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information

I've read it More information